Showing 1031-1040 from 1131
... Block any Downloads of a Specific File Type This page explains how to configure CCS to prohibit downloads of specific types of file. Example scenarios: Some malicious websites try to push malware in .exe file format. These files, known as executables, can run commands on your computer. If the .exe is malicious then these commands could install a virus...
http://help.comodo.com/topic-467-1-1050-16715-Block-any-Downloads-of-a-Specific-File-Type.html... Block any Downloads of a Specific File Type This page explains how to configure CIS to prohibit downloads of specific types of file. Example scenarios: Some malicious websites try to push malware in .exe file format. These files, known as executables, can run commands on your computer. If the .exe is malicious then these commands could install a...
http://help.comodo.com/topic-72-1-766-9096-Block-Any-Downloads-of-a-Specific-File-Type.html... Blocking any Downloads of a Specific File Type Comodo Internet Security can be configured to block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your computer. If the .exe is malicious in intent then these commands could...
http://help.comodo.com/topic-72-1-451-4811-Blocking-Any-Downloads-of-a-Specific-File-Type.html... Filtering 'Device Control' Logs Comodo Client Security allows you to create custom views of all logged events according to user defined criteria. You can use the following types of filters: Preset Time Filters Advanced Filters Preset Time Filters Clicking on the handle at the bottom enables you to filter the log entries for a selected time period: Today - Displays all...
http://help.comodo.com/topic-399-1-790-11200-Filtering-Device-Control-Logs.html... Containment - An Overview The container is an isolated operating environment for unknown and untrusted applications. Running an application in the container means that it cannot make changes to other processes, programs or data on your local computer. Applications in the container are executed under a carefully selected set of privileges and write to a virtual file system and registry instead...
http://help.comodo.com/topic-399-1-904-11887-Containment---An-Overview.html... VirusScope Logs Click 'Logs' in the XCS menu bar Select 'VirusScope Events' from the drop-down at upper-left Date & Time - When the event occurred. Location – The installation path of the suspicious application Malware Name – The malicious item that was detected. Action - How VirusScope handled the malware. Reverse - VirusScope attempted to undo any changes made by the malicious...
http://help.comodo.com/topic-463-1-1033-15903-VirusScope-Logs.html... VirusScope Logs Click 'Tasks' > 'Advanced Tasks' > 'View Logs' OR Click ‘Logs’ in advanced view of the CIS home screen Select 'VirusScope Events' from the drop-down at upper-left Date & Time - When the event occurred. Location - The installation path of the suspicious application Malware Name – The malicious item that was detected Action - How VirusScope handled the...
http://help.comodo.com/topic-72-1-766-9119-VirusScope-Logs.html... Add and Manage Policy Routing Rules The 'Policy Routing' interface shows all pre-configured static routes and policy routing rules. Policy routing rules can route traffic from external networks, zones, interfaces, VPN users or client s to network zones or VPN users. Rules can be configured to pass packets with a specific 'Type of Service' parameter. You can create new...
http://help.comodo.com/topic-451-1-936-12820-Add-and-Manage-Policy-Routing-Rules.html... File Groups Click 'Settings' > 'File Rating' > 'File Groups' As the name suggests, a file group is a collection of one or more file types. For example, the 'Executables' group is a list of file types that can run code on your computer. Once created, file groups can be named as the target of a rule...
http://help.comodo.com/topic-72-1-766-9180-File-Groups.html... Run an Application or Browser in the Sandbox You can run browsers or untested applications in the sandbox to prevent them from potentially infecting your PC. Both application types will run as normal in the sandbox, but will not be allowed to access other processes or user data. There are various methods you can use to manually run applications/browsers inside...
http://help.comodo.com/topic-394-1-767-12114-Run-an-Application-or-Browser-in-the-Sandbox.html